|
Vulnerability Assessment & Network Security Forums |
|||||||||
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery. Home >> Browse Vulnerability Assessment Database >> CGI abuses >> Clever Copy connect.inc Information Disclosure Vulnerability Vulnerability Assessment Details
|
Clever Copy connect.inc Information Disclosure Vulnerability |
||
Reads Clever Copy's admin/connect.inc file Detailed Explanation for this Vulnerability Assessment Summary : The remote web server contains a PHP application that is affected by an information disclosure flaw. Description : The remote host is running Clever Copy, a free web portal written in PHP. The version of Clever Copy installed on the remote host fails to limit access to the 'admin/connect.inc' include file, which contains information used by the application to connect to a database. An unauthenticated attacker can view the contents of this file using a simple GET command and use the information to launch other attacks against the affected host. See also : http://advisories.echo.or.id/adv/adv28-K-159-2006.txt Solution : Limit access to Clever Copy's admin directory using, say, a .htaccess file. Network Security Threat Level: Low / CVSS Base Score : 2 (AV:R/AC:L/Au:NR/C:P/A:N/I:N/B:N) Networks Security ID: 17461 Vulnerability Assessment Copyright: This script is Copyright (C) 2006 Tenable Network Security |
||
Cables, Connectors |
|
||
No Discussions have been posted on this vulnerability. |